Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: The tapes were re-used (Score 3, Insightful) 307 307

A while back there was a huge hunt to find the original tapes used to record the lunar landing. It is suspected that the tape was re-used due to NASA's tight budget and they couldn't afford more tape. The tape was very expensive at the time so it was common to just re-use what they could find. The Apollo mission was done, so why would they need to keep the tape around. I'm sure it seemed like a good idea at the time.

That or it's stashed under someone's coffee table and forgotten about.

Comment: Oversimplified (Score 1) 74 74

It's a oversimplification to say the creators of software and hardware that make up networks and services must be held accountable for security. There is an inherent state that many of the bugs that get exploited are unknowable until somone stumbles upon them. Either the software's creator or the bad-actor finds it first and that's where the trouble lies.

I think the larger issue is the design of the internet is way too open and without any accountability.

Comment: Re:Again? (Score 5, Insightful) 141 141

I'm ham licensed as well, and this kind of news is a really important aspect of the hobby. There are lots of folks out there who would like to take our radio space and sell it off and it is important that we keep reminding folks that when things get ugly we keep working.

Comment: Re:Confused much? (Score 1) 703 703

This is a good point. Let's forget how climate change is happening and focus on the fact that it is happening. Then independently we can tackle the morality of ecology. Trashing our planet for excessive profit, or luxury is really not OK under any circumstance.

Humans are stupid.

Comment: Two things you can do now (Score 1) 312 312

If you're a home user not much you can do aside from releasing and renewing your IP. I work for supporting a fast growing SaaS product and I've had to do my homework on this.

Two things:

1. Make sure your edge firewall / router has a high Packets Per Second capability. A DDoS attack may not involve a lot of bandwidth but rather send a boatload of packets at you. Your edge network will need to process it all, and if it can't you start dropping packets for things you want and don't want.

2. Out bandwidth 'em. I've not tried it, but I'm interested in Akamai PLXrouted service. In a nutshell if you get a bandwidth attack you adjust your BGP routes to push traffic though Akamai, who can provide Terabits of shitfilter for you. DDoS zero, you win. Or cloud it, using Amazon EC2 as a filter with a bunch of proxy instances that self heal if they get knocked out.

Comment: Re:Fox News? (Score 1) 682 682

The Federal IT shops are a shitshow run by bottom feeding contractors who give zero feels. The Feds they support generally are paper pushers for whom computers are magical beings filled with little elves, and robots and give zero feels how it all works.

So yeah. Not hating. Just been there myself.

Comment: Re:IPv6 Addresses (Score 2) 305 305

IPv6 sort of demands that you forget everything you know about IPv4. Once you get IPv6, you'll ask yourself why anybody still uses IPv4. For example.

There are more /48 networks in IPv6 space than there are IPv4 addresses. Everybody ought to get a /48 network which include 18 quintillion addresses. The first part of the a global unicast address is often referred to as a prefix and all your IP's will have that. The second part may be derived from you NIC's MAC. So there is some good sense to it.

You'll really want to use DNS.

I'm using IPv6 at home and work now and think its time is way overdue.

At the source of every error which is blamed on the computer you will find at least two human errors, including the error of blaming it on the computer.